L8 - L9 Malicious Software and Firewalls Flashcards
What is malware?
Programs designed to exploit vulnerabilities in computer systems.
Name 4 types of malware that need hosts.
- Virus
- Trapdoor
- Trojan Hourses
- Logic Bombs
Name to types of malware that do not need a host.
- Worm
- Zombie
Name three types of malware that do not replicate.
- Trapdoors
- Logic bombs
- Trojan horses
Name three types of malware that do replicate.
- Viruses
- Worms
- Zombies
What is a Trap door?
- A secret entry point into a program
- Sometimes trap doors are added to facilitate programmers to debug and test.
- Become a threat when used to gain unauthorized access
What is a logic bomb?
Code embedded in a legitimate program that is triggered when certain conditions are met.
Triggers include
Particular date
Presence of absence of a file
Particular user running a particular program
The code is said to ‘explode’, the damage it causes
include:
Deleting data or files
Causing machine to halt
What is a Trojan horse?
- Program that has hidden code which when invoked performs an unwanted of harmful action
What is a Zombie?
- Program that takes over another networked computer.
- Used to launch an attack which is subsequently difficult to trace back to the creator of the zombie.
- Denial of Service attack, many computers infected by the zombie are used to overwhelm a target website
What is a Virus?
- A program that inserts itself into one or more programs bymodifying them.
- This modification includes a copy of the virus program.
- This enables the virus to spread
- The virus is attached to another program and executes when this host program is run.
- The virus does not just copy itself, it can perform other actions such a deleting files, etc.
- Most viruses often designed for specific operating systems, possibly specific hardware. They are designed to take advantage of the weaknesses of particular systems.
What are the four phases of a virus?
- Dormant Phase - Virus is idle and waiting for an activation event, e.g. a date. Not all viruses have this stage
- Propagation Phase - Virus copies itself into other programs or system areas
- Triggering Phase - Virus is activated to perform an action. The trigger can be any number of events, such as a count of the number of times it has replicated
- Execution Phase - The action is performed. This can range from harmless such as a message, to destruction of data and programs
Name 5 types of viruses
- Parasitic
- Memory Resident
- Boot Sector
- Stealth
- Polymorphic
What are worms?
- A malicious program that replicates itself but does not require a host program. It is a stand-alone program.
- It actively seeks to infect other machines.
- Network worms use network connections to spread.
- Exhibit similar characteristics (the phases of a virus).
- Inn addition, once a worm is active it can perform a destructive action in the infected system.
- One of the first worms was written at Xerox PARC: aprogram looking for idle processors assigning them tasks
What is a firewall?
- A firewall is a machine standing between the local network and the Internet filtering out traffic that might be harmful
- All traffic from inside to outside must pass through the firewall, which is achieved by physically blocking all access to the local network except via the firewall
- Only authorized traffic, which is defined by the local security policy, will be allowed to pass
- The firewall is immune to penetration.
- A firewall defines a single choke point, this simplifies
security management because the security capabilities are consolidated on a single system (or set of systems). - Audits and alarms can be implemented on the firewall
system.The firewall can also be used for non-security related functions. For example Internet usage logs.
Name the three levels / types of firewalls
Filtering can be done at three levels
- Packet Filtering
- Circuit Gateway
- Application Gateway